Skip to content

Commit 729236a

Browse files
authored
Merge pull request #4188 from MicrosoftDocs/main
pushing updates live
2 parents 9c37186 + 9d8d5f5 commit 729236a

File tree

143 files changed

+229
-202
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

143 files changed

+229
-202
lines changed

defender-endpoint/advanced-features.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ audience: ITPro
1111
ms.collection:
1212
- m365-security
1313
- tier2
14-
ms.topic: conceptual
14+
ms.topic: how-to
1515
ms.subservice: onboard
1616
search.appverid: met150
1717
ms.date: 02/25/2025

defender-endpoint/aggregated-reporting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ audience: ITPro
1010
ms.collection:
1111
- m365-security
1212
- tier3
13-
ms.topic: conceptual
13+
ms.topic: article
1414
search.appverid: met150
1515
ms.date: 03/04/2025
1616
appliesto:

defender-endpoint/android-configure-mam.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- m365-security
1313
- tier3
1414
- mde-android
15-
ms.topic: conceptual
15+
ms.topic: how-to
1616
ms.subservice: android
1717
ms.date: 08/26/2024
1818
---

defender-endpoint/android-support-signin.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.collection:
1111
- m365-security
1212
- tier3
1313
- mde-android
14-
ms.topic: conceptual
14+
ms.topic: troubleshooting-general
1515
ms.subservice: android
1616
search.appverid: met150
1717
ms.date: 03/21/2025

defender-endpoint/api/api-power-bi.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- m365-security
1313
- tier3
1414
- must-keep
15-
ms.topic: conceptual
15+
ms.topic: how-to
1616
ms.subservice: reference
1717
ms.custom: api
1818
search.appverid: met150

defender-endpoint/assign-portal-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ audience: ITPro
1212
ms.collection:
1313
- m365-security
1414
- tier2
15-
ms.topic: conceptual
15+
ms.topic: how-to
1616
ms.date: 01/28/2025
1717
---
1818

defender-endpoint/attack-surface-reduction-rules-deployment-implement.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ search.appverid: met150
2828
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
2929
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
3030

31-
Implementing attack surface reduction rules move the first test ring into an enabled, functional state.
31+
When you're implementing attack surface reduction rules, move the first test ring into an enabled, functional state.
3232

3333
> :::image type="content" source="media/asr-rules-implementation-steps.png" alt-text="The procedure to implement attack surface reduction rules" lightbox="media/asr-rules-implementation-steps.png":::
3434
@@ -44,7 +44,7 @@ Implementing attack surface reduction rules move the first test ring into an ena
4444
4. Switch problematic rules back to Audit.
4545

4646
> [!NOTE]
47-
> For problematic rules (rules creating too much noise), it's better to create exclusions than to turn off rules or switching back to Audit. You'll have to determine what is best for your environment.
47+
> For problematic rules (rules creating too much noise), it's better to create exclusions than to turn off rules or switching back to Audit. You have to determine what is best for your environment.
4848
4949
> [!TIP]
5050
> When available, take advantage of the Warn mode setting in rules to limit disruptions. Enabling attack surface reduction rules in Warn mode enables you to capture triggered events and view their potential disruptions, without actually blocking end-user access. Learn more: [Warn mode for users](attack-surface-reduction.md#warn-mode-for-users).
@@ -57,15 +57,15 @@ Warn mode is effectively a Block instruction, but with the option for the user t
5757

5858
When you're confident that you've correctly configured the attack surface reduction rules for ring 1, you can widen the scope of your deployment to the next ring (ring n + 1).
5959

60-
In the follwing deployment process, steps 1 – 3 are essentially the same for each subsequent ring:
60+
In the following deployment process, steps 1 – 3 are essentially the same for each subsequent ring:
6161

6262
1. Test rules in Audit mode.
6363

6464
2. Review attack surface reduction-triggered audit events in the Microsoft Defender portal.
6565

6666
3. Create exclusions.
6767

68-
4. Review: refine, add, or remove exclusions as necessary.
68+
4. Review, and then refine, add, or remove exclusions as necessary.
6969

7070
5. Set rules to "block" mode.
7171

@@ -77,7 +77,7 @@ In the follwing deployment process, steps 1 – 3 are essentially the same for e
7777

7878
#### Customize attack surface reduction rules
7979

80-
As you continue to expand your attack surface reduction rules deployment, you might find it necessary or beneficial to customize the attack surface reduction rules that you've enabled.
80+
As you continue to expand your attack surface reduction rules deployment, you might find it necessary or beneficial to customize the attack surface reduction rules that are enabled.
8181

8282
##### Exclude files and folders
8383

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier2
1717
- mde-asr
18-
ms.date: 04/30/2025
18+
ms.date: 06/10/2025
1919
search.appverid: met150
2020
---
2121

@@ -651,6 +651,9 @@ GUID: `a8f5898e-1dc8-49a9-9878-85004b8a61e6`
651651

652652
Dependencies: Microsoft Defender Antivirus
653653

654+
> [!NOTE]
655+
> When managing ASR rules using Microsoft Defender for Endpoint security settings management, the setting for **Block Webshell creation for Servers** must be configured as `Not Configured` in Group Policy or other local settings. If this rule is set to any other value (such as `Enabled` or `Disabled`), it could cause conflicts and prevent the policy from applying correctly through security settings management.
656+
654657
### Block Win32 API calls from Office macros
655658

656659
This rule prevents VBA macros from calling Win32 APIs. Office VBA enables Win32 API calls. Malware can abuse this capability, such as [calling Win32 APIs to launch malicious shellcode](https://www.microsoft.com/security/blog/2018/09/12/office-vba-amsi-parting-the-veil-on-malicious-macros/) without writing anything directly to disk. Most organizations don't rely on the ability to call Win32 APIs in their day-to-day functioning, even if they use macros in other ways.

defender-endpoint/basic-permissions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ audience: ITPro
1414
ms.collection:
1515
- m365-security
1616
- tier2
17-
ms.topic: conceptual
17+
ms.topic: how-to
1818
search.appverid: met150
1919
ms.date: 06/25/2024
2020
---

defender-endpoint/behavior-monitor-macos.md

Lines changed: 21 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: ewalsh
66
manager: deniseb
77
ms.service: defender-endpoint
88
ms.topic: overview
9-
ms.date: 05/15/2025
9+
ms.date: 06/06/2025
1010
ms.subservice: ngp
1111
audience: ITPro
1212
ms.collection:
@@ -61,7 +61,7 @@ The following sections describe each of these methods in detail.
6161

6262
### Intune deployment
6363

64-
1. Copy the following XML to create a _.plist_ file and save it as **BehaviorMonitoring_for_MDE_on_macOS.mobileconfig**
64+
1. Copy the following XML to create a _.plist_ file and save it as `BehaviorMonitoring_for_MDE_on_macOS.mobileconfig`.
6565

6666
```xml
6767
<?xml version="1.0" encoding="UTF-8"?>
@@ -131,15 +131,15 @@ The following sections describe each of these methods in detail.
131131

132132
5. Go to the plist file you saved earlier and save it as `com.microsoft.wdav.xml`.
133133

134-
6. Enter `com.microsoft.wdav` as the **custom configuration profile name**.
134+
6. Specify `com.microsoft.wdav` as the **custom configuration profile name**.
135135

136136
7. Open the configuration profile and upload the `com.microsoft.wdav.xml` file and select **OK**.
137137

138138
8. Select **Manage** > **Assignments**. In the **Include** tab, select **Assign to All Users & All devices or to a Device Group or User Group.**
139139

140140
#### JamF deployment
141141

142-
1. Copy the following XML to create a _.plist_ file and save it as **Save as BehaviorMonitoring_for_MDE_on_macOS.plist**
142+
1. Copy the following XML to create a _.plist_ file and save it as `Save as BehaviorMonitoring_for_MDE_on_macOS.plist`:
143143

144144
```xml
145145
<?xml version="1.0" encoding="UTF-8"?>
@@ -161,8 +161,11 @@ The following sections describe each of these methods in detail.
161161
```
162162

163163
2. In **Computers** > **Configuration Profiles**, select **Options** > **Applications & Custom Settings**,
164+
164165
3. Select **Upload File** (_.plist_ file).
165-
4. Set preference domain to *com.microsoft.wdav*
166+
167+
4. Set preference domain to `com.microsoft.wdav`.
168+
166169
5. Upload the plist file saved earlier.
167170

168171
For more information, see: [Set preferences for Microsoft Defender for Endpoint on macOS](/defender-endpoint/mac-preferences).
@@ -183,6 +186,16 @@ sudo mdatp config behavior-monitoring --value disabled
183186

184187
For more information, see: [Resources for Microsoft Defender for Endpoint on macOS](/defender-endpoint/mac-resources).
185188

189+
### Verifying behavior monitoring is enabled
190+
191+
To verify behavior monitoring is enabled, open Terminal, copy and run the following command:
192+
193+
```bash
194+
mdatp health --details features
195+
```
196+
197+
When behavior monitoring is enabled, the result displays the value of `behavior_monitoring` as enabled.
198+
186199
### To test behavior monitoring (prevention/block) detection
187200

188201
See [Behavior Monitoring demonstration](demonstration-behavior-monitoring.md).
@@ -192,9 +205,7 @@ See [Behavior Monitoring demonstration](demonstration-behavior-monitoring.md).
192205
The existing Microsoft Defender for Endpoint on macOS command line interface can be used to review behavior monitoring details and artifacts.
193206

194207
```bash
195-
196208
sudo mdatp threat list
197-
198209
```
199210

200211
### Frequently asked questions (FAQ)
@@ -224,7 +235,7 @@ sudo mdatp exclusion process add --path <path to process with lots of events>
224235
```
225236

226237
> [!IMPORTANT]
227-
> Please verify the reliability of the processes being excluded. Excluding these processes will prevent all events from being sent to behavior monitoring and from undergoing content scanning. However, EDR will continue to receive events from these processes. It is important to note that this mitigation is unlikely to reduce CPU usage of the `wdavdaemon` or `wdavdaemon_enterprise` processes, but may affect `wdavdaemon_unprivileged`. If the other two processes are also experiencing high CPU usage, behavior monitoring may not be the sole cause, and contacting Microsoft support is recommended.
238+
> Verify the reliability of the processes being excluded. Excluding these processes will prevent all events from being sent to behavior monitoring and from undergoing content scanning. However, EDR will continue to receive events from these processes. It is important to note that this mitigation is unlikely to reduce CPU usage of the `wdavdaemon` or `wdavdaemon_enterprise` processes, but may affect `wdavdaemon_unprivileged`. If the other two processes are also experiencing high CPU usage, behavior monitoring may not be the sole cause, and contacting Microsoft support is recommended.
228239
229240
Once done, disable behavior monitoring statistics:
230241

@@ -269,29 +280,21 @@ NRI should have a low impact on network performance. Instead of holding the conn
269280
2. Enable behavior monitoring if it's not already enabled:
270281

271282
```Bash
272-
273-
sudo mdatp config behavior-monitoring --value enabled
274-
283+
sudo mdatp config behavior-monitoring --value enabled
275284
```
276285

277286
3. Enable network protection in block mode:
278287

279288
```Bash
280-
281289
sudo mdatp config network-protection enforcement-level --value block
282-
283290
```
284291

285292
1. Enable network real-time inspection (NRI):
286293

287-
```Bash
288-
294+
```Bash
289295
sudo mdatp network-protection remote-settings-override set --value "{\"enableNriMpengineMetadata\" : true}"
290-
291-
292296
```
293297

294298
> [!NOTE]
295299
> While this feature is in preview, and because the setting is set by using command line, network real-time inspection (NRI) doesn't persist following reboots. You must re-enable it.
296300
297-

0 commit comments

Comments
 (0)